By Mark Russinovich
Michael Lewis' Flash Boys printed how high-frequency buying and selling has created a ruthless breed of investors able to successful whichever approach the marketplace turns. In Rogue Code, Mark Russinovich takes it one step extra to teach how their grip on excessive finance makes the inventory marketplace prone to hackers who may well lead to around the globe monetary collapse.
Cyber defense professional Jeff Aiken understands that no desktop procedure is totally safe. whilst he is known as to enquire a potential breach on the long island inventory alternate, he discovers not just that their process has been infiltrated yet that somebody at the within understands. but for a few cause, they've got allowed the hackers to thieve hundreds of thousands of bucks from bills with no attempting to cease the theft.
When Jeff uncovers the crime, the NYSE abruptly activates him. Accused of grand larceny, he needs to locate and disclose the criminals at the back of the robbery, not only to turn out his innocence yet to prevent a multibillion-dollar heist which could upend the U.S. economic system. Unwilling to heed Jeff's warnings, the NYSE plans to proceed with an immense IPO utilizing a brand new, untested method, person who may be weak either to hackers and to ruthless high-frequency investors prepared to take any probability to show a profit.
Now Jeff Aiken needs to unearth the reality on his personal, following the thread to the again alleys of Rio de Janeiro to tackle one of many world's so much ruthless cartels.
Praised for his mixture of real-world know-how and quick-paced motion, with Rogue Code Mark Russinovich grants an extreme mystery a few cyber risk that turns out all too possible---and the Wall highway investors who could enable it to happen.
Includes a foreword through Haim Bodek, writer of The challenge of HFT: amassed Writings on excessive Frequency buying and selling & inventory marketplace constitution Reform.
Read Online or Download Rogue Code: A Jeff Aiken Novel PDF
Best security books
Why has CompTIA (the high-profile laptop know-how organization in the back of the wildly renowned A+ and community+ certifications) distinct safeguard for its most modern credential? due to hovering e-business tasks and all over the world web connectivity, fresh survey stats from the pc defense Institute (CSI) exhibit we want extra community safety specialists-fast!
This ebook constitutes the refereed complaints of the sixteenth eu Symposium on computing device protection, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers integrated within the publication have been rigorously reviewed and chosen from one hundred fifty five papers. The articles are equipped in topical sections on instant protection; internet safety; forensics, biometrics and software program safety; entry keep watch over; cryptography and protocol research; info circulation, part channels, and vulnerability research; usability, belief, and economics of safety and privateness; and privateness.
The practise and characterization of assorted nano-scaled fabrics and their functions in varied safety and security- comparable fields. Readers are supplied with a large evaluation at the subject because it combines articles addressing the education and characterization of other nano-scaled fabrics (metals, oxides, glasses, polymers, carbon-based, and so forth.
Michael Lewis' Flash Boys printed how high-frequency buying and selling has created a ruthless breed of investors in a position to profitable whichever means the marketplace turns. In Rogue Code, Mark Russinovich takes it one step additional to teach how their grip on excessive finance makes the inventory marketplace liable to hackers who might result in around the globe monetary cave in.
- Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication: Datenschutz und Datensicherheit in Telekommunikations- und Informationssystemen / Privacy and Information Security in Communication and Information Systems
- Getting an Information Security Job for Dummies
- Unauthorised Access: Physical Penetration Testing For IT Security Teams
- The Politics of Intelligence and American Wars with Iraq
- Food Security Issues in the Arab Near East. A Report of the United Nations Economic Commission for Western Asia
- Security Strategies in the Asia-Pacific: The United States' "Second Front " in Southeast Asia
Additional info for Rogue Code: A Jeff Aiken Novel
As she could get, and Daryl thought the profound change in culture would do her good. To her surprise, Clive tried to talk her out of making the move. “You and Jeff are special,” he said. “Don’t do anything you’ll regret. You aren’t going to do any better, Daryl, neither of you is. Stay put, give this some time, rethink your priorities. ” But his recommendation had been shared to no avail. She’d told Clive this was Jeff’s decision and that he was talking to the wrong person. Finally, they agreed to terms and Clive had offered to help find her an apartment.
Stern appeared to compose himself before taking the seat, and he leaned forward in agitation. “No,” Kramer said. ” He replaced the telephone, then sat back in his chair. “That was Vivian. You scared the hell out of her. ” He looked at the man evenly. ” “Security? I was with your dad for eight years and never had a complaint. When you took over he asked me to stay on, so I did out of respect for him. When my wife and I came to you thirteen years ago and told you our retirement plans, you wrote up this very impressive proposal, with an investment arc that got us where we needed to be.
As the financial crisis proves, often Wall Street itself can be its biggest threat. Rogue Code is a work of fiction. The bad guys don’t run multibillion-dollar hedge funds that have institutionalized illegal insider trading into a business model. They don’t run massive Ponzi schemes affiliated with unusually successful trading companies. They don’t publicly brag about their multi-year zero-loss trading days fueled by “secret sauce” that only recently has caught the attention of regulators. In my experience, the current threat to Wall Street isn’t going to come from abroad … it has already firmly embedded itself into the fabric of our marketplace.